📢 New Webinar: Bayesian Modeling of Cyber Risk (21st Feb, 17:00 UTC)

Risk assessment is challenging when data is unavailable, hard to obtain, or costly to process. Organizations often request estimates from experts instead. This talk demonstrates how to integrate cybersecurity data with expert estimates using Bayesian modeling in PyMC.

Cybersecurity analysts, resource managers, and executives can use Bayesian models to perform risk assessments, select security controls, and prioritize which suspicious events to investigate first. System administrators can configure autonomous sources of data including vulnerability scanners and cybersecurity event monitoring systems to automatically update these hybrid network models alongside inputs from risk analysts and executives.

Date & Time: 2024-02-21T17:00:00Z
Speakers: Corey Neskey, Vice President of quantitative risk at Hive Systems
Host: Dr. Thomas Wiecki, CEO & Founder of PyMC Labs
Register for the Zoom link:

:briefcase: About the speaker:
Corey Neskey (Hive Systems)

Corey is Vice President of quantitative risk at Hive Systems, where he develops Derive, a powerful risk modeling and cybersecurity inference platform. His work combines expert knowledge elicitation methods with PyMC and Bayesian network models to solve problems in cybersecurity risk quantification and inform executive decision-making. Corey holds a MSc in cybersecurity intelligence and forensics, a CISSP, and undergraduate degrees in science and philosophy. Prior to joining Hive Systems, he worked at RSA, EMC, Dell SecureWorks, Bloomberg L.P, and NYU.

:link: Connect with Corey:
:point_right: LinkedIn: Corey Neskey ☕︎ - Hive Systems | LinkedIn
:point_right: Website: https://www.deriverisk.com
:point_right: GitHub: cneskey (Corey Neskey) · GitHub
:point_right: Blog posts: Approachable Cyber Threats (ACT) Posts

3 Likes

We are going live in 30 min. In case you missed it, here is the Zoom link to join: Webinar Registration - Zoom

See you there! :grinning:

In case you missed our live webinar on “Bayesian Modeling of Cyber Risk”, The recording has been posted to YouTube, catch it now: